Search the Community
Showing results for tags 'wikileaks'.
Found 4 results
I thought this was an interesting perspective........ https://www.freemansperspective.com/julian-assange-really/ WHAT JULIAN ASSANGE IS REALLY DOING FREEMANSPERSPECTIVE · APR 18TH, 2017 Share Most people know the what about Julian Assange and WikiLeaks – that they publish secret information – but they don’t know the why. And that’s a great loss, because the reason behind all the leaks is both brilliant and illuminating. It Usually Starts with the Cypherpunks The first thing to understand is that WikiLeaks, like Bitcoin, came from the cypherpunks. In particular, WikiLeaks was spawned by a cypherpunk group that formed (spontaneously) in Melbourne, Australia. In other words, WikiLeaks is the creation of some smart guys who were inspired by Timothy C. May, Eric Hughes, Murray Rothbard, and a few others. Assange was part of this group and an intriguing thinker in his own right. Assange explained what WikiLeaks would be doing, and why, back in 2006, and you can still find copies of that work here. Given the worldwide recognition of WikiLeaks, it’s a little crazy that this is so little known and discussed, but I’ll do my part to change that condition. The Core Ideas Assange starts out by describing modern governance as conspiracy. He invokes Teddy Roosevelt, who said, “Behind the ostensible government sits enthroned an invisible government owing no allegiance and acknowledging no responsibility to the people.” Assange calls these conspirators “neocorporatists,” referring to the entire complex of legislators, bureaucrats, and the corporations who purchase laws from them. He goes on to describe them as existing in elaborate networks, a theme that Jonathan Logan and I examined in The New Age of Intelligence and that was the subject of a landmark study in 2011 by Vitali, Glattfelder, and Battiston, entitled The Network of Global Corporate Control. These networks – the real power behind the apparent power – are WikiLeaks’s actual targets, not the governments they may seem to be addressing. This is the first thing to understand about WikiLeaks. What Assange wants to affect is communication inside these networks. This passage explains why fairly well: [W]e see conspiratorial interactions among the political elite… the primary planning methodology behind maintaining or strengthening authoritarian power… these plans are concealed by successful authoritarian powers. WikiLeaks was designed to hurt power that hides its intentions. But merely unmasking those intentions is not the goal; Assange, brilliantly, goes after something deeper than that. Preventing Obscured Power from Using Power Assange writes: Not every conspirator trusts or knows every other conspirator even though all are connected. Some are on the fringe of the conspiracy, others… [may] be a bridge between important sections or groupings of the conspiracy. He goes on to say that such a network can be disrupted by “distorting or restricting the information available to it,” by “unstructured attacks on [its] links,” by dividing the network by cutting links. Then he adds this: A conspiracy sufficiently engaged in this manner is no longer able to comprehend its environment and plan robust action. This is Assange’s goal: He wants to stop the “conspiracy” from trusting itself. The goal of WikiLeaks is to prevent a network of this type from communicating with itself. So, when WikiLeaks publishes the Democratic National Committee’s dirty secrets (to pick just one example), it’s not trying to drive public outrage, as reasonable as that might be. Rather, it’s trying to make the conspirators distrust each other, and especially to distrust their communications, because if those links go, networked power goes with them. And It Gets Even Better I hope you can see how brilliant the WikiLeaks strategy really is. They’re not reacting after the events, as in exposing dirty laundry. They are acting in advance, disrupting their enemy’s ability to function in the future. And here’s where it gets even better: A network of this type invariably reacts to leaks by closing itself tighter against untrusted links. And so, by closing itself off from intrusion, the network becomes less and less able to engage with anything outside itself. And the less it engages with things outside itself, the less it can enact power outside itself. Once the obscure conduits of elite power become so paranoid that they can no longer conspire among themselves, WikiLeaks has won. As Assange writes: The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie… in a world where leaking is easy, secretive or unjust systems are nonlinearly hit…. What Led to This? As noted above, I find this a brilliant strategy. More than this will be required to bring our world out of its current barbaric age, but this is a fascinating and important part. Before I close, I’d like to aquatint you with the mindset that produced this. And so, here is an edited passage from Assange’s book, Cypherpunks: Freedom and the Future of the Internet: The new world of the internet longed for independence. But states and their friends moved to control our new world. They leached into the veins and arteries of our new societies, gobbling up every relationship expressed or communicated, every webpage read, every message sent and every thought googled, and then stored this knowledge, undreamed of power, in top secret warehouses, forever. And then the state reflected what it had learned back into the physical world, to start wars, to target drones, to manipulate UN committees and trade deals, and to do favors for its vast network of industries, insiders and cronies. If this isn’t the kind of world you want, I encourage you to get busy creating a better one. Watching and complaining will never give you what you want. * * * * * A book that generates comments like these, from actual readers, might be worth your time: I just finished reading The Breaking Dawn and found it to be one of the most thought-provoking, amazing books I have ever read… It will be hard to read another book now that I’ve read this book… I want everyone to read it. Such a tour de force, so many ideas. And I am amazed at the courage to write such a book, that challenges so many people’s conceptions. There were so many points where it was hard to read, I was so choked up. Holy moly! I was familiar with most of the themes presented in A Lodging of Wayfaring Men, but I am still trying to wrap my head around the concepts you presented at the end of this one.
Wikileaks founder Julian Assange has said that Wikileaks have obtained information that, when released soon, will guarantee a Hillarious Clinton indictment. During a recent interview with ITV, Assange said his next release will: Silenceisconsent.net reports: WikiLeaks has already published 30,322 emails from Clinton’s private email server, spanning from June 30, 2010 to August 12, 2014. While Assange didn’t specify what exactly was in the emails, he did tell ITV that WikiLeaks had “accumulated a lot of material about Hillarious Clinton, which could proceed to an indictment.” Assange hinted that the emails slated for publication contain additional information about the Clinton Foundation. He also reminded ITV’s Robert Peston that previously released emails contained one damning piece of communication from Clinton, instructing a staffer to remove the classification settings from an official State Department communication and send it through a “nonsecure” channel. Assange then pointed out that the Obama administration has previously prosecuted numerous whistleblowers for violating the government’s procedures for handling classified documents. In regard to the ongoing FBI investigation, however, Assange expressed a lack of confidence in the Obama administration’s Justice Department to indict the former Secretary of State. WikiLeaks has long been a thorn in the side of the former Secretary of State, who called on President Obama to prosecute the whistleblowing site after its 2010 leak of State Department cables. Julian Assange remains confined to the Ecuadorian Embassy in downtown London, as Ecuador has promised to not hand over the WikiLeaks founder to US authorities.
New document Barzani link reveal intelligence Arabia and Plan "drop" al-Maliki Date: 20/06/2015 15:39 Information / Baghdad / .. revealed a new document from the Organization of "Wikileaks" Swedish, Saturday, for correlation President of Iraqi Kurdistan, Massoud Barzani, intelligence Saudi Arabia, and the secrets of dropping the former prime minister Nuri al-Maliki's plan. According to the document published by the "WikiLeaks" by and seen by agency / information /, that "the Saudi foreign minister, former Saud al-Faisal made a call to the President of Iraqi Kurdistan Massoud Barzani to visit the kingdom and to meet with the Saudi king, for the purpose of inclusion in the row not to collaborators with the former Iraqi Prime Minister Nuri al-Maliki." The relay document "that al-Maliki calls these days to the abolition of the Constitution. " The WikiLeaks published the first Thursday leaked documents about the secret correspondence between the Saudi Embassy and various other embassies around the world, and pledged to deploy nearly 500 thousand secret message Okhry.anthy / 25 h
http://rt.com/usa/obama-insider-threat-leaks-905/ Obama administration urges federal employees to spy on each other to avoid leaks Get short URL Published time: July 10, 2013 18:22 Edited time: July 10, 2013 19:09 President Barack Obama has asked that federal agencies launch an unprecedented campaign requiring government workers to monitor the behavior of their colleagues and report potential leakers under the threat of prosecution. McClatchy reporters Jonathan Landay and Marisa Taylor wrote Tuesday that the “Insider Threat” program mandated by Pres. Obama utilizes methods that, while meant to identify security threats from within, actually provoke co-workers to spy on one another. The program is unprecedented in scope and hopes to prevent future instances where government secrets are spilled. According to a new report, however, the Insider Threat initiative and the techniques utilized by the agencies involved are not proven to work. Insider Threat was authorized in October 2011 after Army Private first class Bradley Manning sent classified intelligence to the website WikiLeaks, an action that government prosecutors argued in court this week aided al-Qaeda by indirectly providing them with secret documents. Through the program, employees are asked to monitor the behavior of their peers, and could face hefty penalties if they fail to alert higher-ups of a potential breach. Specifically, the Insider Threat program asks that officials within the ranks of federal agencies spanning all sectors of the government adopt behavioral profiling techniques that ideally would alert higher-ups of a subordinate interested in leaking intelligence. The White House, the Justice Department, the Peace Corps and the departments of Health and Human Services, Homeland Security and Education have all been asked to watch out for “high-risk persons or behaviors” among co-workers under the program, and If “indicators of insider threat behavior” are brought to attention, officials within those agencies are expected to investigate in order to curb the likelihood of another Pfc. Manning. Research conducted by McClatchy reporters combined with expert interviews suggest those efforts are futile, though, and aren’t proven to work. Gene Barlow, a spokesman for the Office of the National Counterintelligence Executive, told McClatchy that “the awareness effort of the program is to teach people not only what types of activity to report, but how to report it and why it is so important to report it.” So far, though, that method hasn’t been proven to actually put potential leakers out of work. According to McClatchy, the “indicators” that federal employees are told to monitor include stress, relationship issues, financial problems, odd work hours and random traveling. “It simply educates employees about basic activities or behavior that might suggest a person is up to improper activity,” Barlow told reporters. On the website for his agency’s Insider Threat program, the Office claims that employees may be lured to “betray their nation for ideological reasons, a lust for money or sex, or through blackmail,” and cites threats from within as “the top counterintelligence challenge to our community." Barlow also stressed that the policy “does not mandate” employees to report behavior indicators, but McClatchy reporters noted that failing to act could land an eyewitness with harsh penalties, including criminal charges. According to a 2008 National Research Council study, however, analyzing these indicators do not necessarily signal that one agent may be up to no good. “There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all,” the study concluded. “We have not found any silver bullets,” added Deana Caputo, a behavioral scientist at MITRE Corp., which assists several US agencies with their insider threat efforts. “We don’t have actually any really good profiles or pictures of a bad guy, a good guy gone bad or even the bad guy walking in to do bad things from the very beginning.”